Virus Bulletin announces Péter Ször Award

Posted by   Virus Bulletin on   May 23, 2014

'Brilliant mind and a true gentleman' commemorated through annual award for technical security research.

In commemoration of the life and work of security researcher Péter Ször, who passed away in November, Virus Bulletin has introduced an annual award which will be known as the "Péter Ször Award". The award will recognise the best piece of technical security research performed each year.

When, last November, the security community learned of Péter's sudden passing, we received a number of suggestions that we should do something to keep his memory alive. We fairly quickly decided to introduce an annual "Péter Ször Award" that would recognise an exceptional contribution to the security industry, and after much consideration, decided that it should be awarded for the best piece of technical security research each year.

Péter Ször contributed almost 40 articles to Virus Bulletin over the years, spoke at several VB conferences, and served for more than ten years on the VB advisory board. He was also well known as the author of the popular The Art of Computer VirusResearch and Defense - a book which, for many, served as their first introduction to and basic grounding in computer security. Most importantly, he was known by everyone who encountered him for his great kindness and generosity.

We are now seeking nominations for the first award. It will be awarded for the best technical security research published between 1 July 2013 and 30 June 2014. You can use this form to send in your nominations, or else do so by emailing [email protected].

The award will be presented during VB2014, 24-26 September in Seattle, WA, USA.



Posted on 23 May 2014 by Martijn Grooten
twitter.png
fb.png
linkedin.png
hackernews.png
reddit.png

 

Latest posts:

VB2021 localhost call for last-minute papers

The call for last-minute papers for VB2021 localhost is now open. Submit before 20 August to have your paper considered for one of the slots reserved for 'hot' research!

New article: Run your malicious VBA macros anywhere!

Kurt Natvig explains how he recompiled malicious VBA macro code to valid harmless Python 3.x code.

New article: Dissecting the design and vulnerabilities in AZORult C&C panels

In a new article, Aditya K Sood looks at the command-and-control (C&C) design of the AZORult malware, discussing his team's findings related to the C&C design and some security issues they identified.

VB2021 localhost call for papers: a great opportunity

VB2021 localhost presents an exciting opportunity to share your research with an even wider cross section of the IT security community around the world than usual, without having to take time out of your work schedule (or budget) to travel.

New article: Excel Formula/Macro in .xlsb?

In a follow-up to an article published last week, Kurt Natvig takes us through the analysis of a new malicious sample using the .xlsb file format.

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.